{"id":2005,"date":"2021-02-08T15:59:44","date_gmt":"2021-02-08T14:59:44","guid":{"rendered":"https:\/\/ict-improve.nl\/?post_type=training&#038;p=2005"},"modified":"2026-04-23T15:47:04","modified_gmt":"2026-04-23T13:47:04","slug":"secure-software-development","status":"publish","type":"training","link":"https:\/\/ict-improve.nl\/en\/training\/secure-software-development\/","title":{"rendered":"Secure Software Development EN"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2005\" class=\"elementor elementor-2005\" data-elementor-post-type=\"training\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3ebfe2ec elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ebfe2ec\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5a1652ca\" data-id=\"5a1652ca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c8f7cf1 elementor-widget elementor-widget-text-editor\" data-id=\"6c8f7cf1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h2 class=\"wp-block-heading\">Secure Programming<\/h2>\n<p><\/p>\n<p><\/p>\n<p style=\"margin-bottom: 12pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><strong><span lang=\"EN-US\" style=\"font-size:11.0pt;\nfont-family:&quot;Calibri&quot;,sans-serif;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:\nminor-latin;mso-bidi-theme-font:minor-latin;color:#111111;mso-ansi-language:\nEN-US\">Empowering Secure Software Development<\/span><\/strong><span lang=\"EN-US\" style=\"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;mso-ascii-theme-font:\nminor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin;\ncolor:#111111;mso-ansi-language:EN-US\">&nbsp;<o:p><\/o:p><\/span><\/p><p>\n\n<\/p><p style=\"margin-bottom: 12pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span lang=\"EN-US\" style=\"font-size:11.0pt;font-family:\n&quot;Calibri&quot;,sans-serif;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:\nminor-latin;mso-bidi-theme-font:minor-latin;color:#111111;mso-ansi-language:\nEN-US\">Secure Software Development is not just about creating software; it is\nabout weaving security into the fabric of your code. It is about minimizing\nvulnerabilities and integrating security measures like robust error handling,\nsolid authentication, and powerful encryption. As a forward-thinking software\ndevelopment team, we believe in prioritizing safety from the get-go, ideally\nduring the design phase of the application itself.<\/span><span lang=\"EN-US\" style=\"font-size:11.0pt;font-family:&quot;Calibri&quot;,sans-serif;mso-ascii-theme-font:\nminor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-theme-font:minor-latin;\nmso-ansi-language:EN-US\"><o:p><\/o:p><\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Secure Programming Empowering Secure Software Development&nbsp; Secure Software Development is not just about creating software; it is about weaving security into the fabric of your code. It is about minimizing vulnerabilities and integrating security measures like robust error handling, solid authentication, and powerful encryption. As a forward-thinking software development team, we believe in prioritizing safety [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":0,"menu_order":99991231,"template":"","meta":{"_acf_changed":true,"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"class_list":["post-2005","training","type-training","status-publish","hentry"],"acf":{"goals":"After this training, you will:\n\n<ul>\n\n<li>Be well-versed in the principles of secure software development<\/li>\n\n<li>Understand the most common vulnerabilities<\/li>\n\n<li>Be equipped with strategies to prevent these vulnerabilities<\/li>\n\n<li>Have gained insights into the evolving role of the agile developer in contrast to traditional environments<\/li>\n\n<\/ul>","description":"<strong>Collaboratively Crafting Secure Software<\/strong>\n\nIn today\u2019s digital age, an increasing number of organizations are falling prey to various forms of cybercrime. As the saying goes, \u201cPrevention is better than cure.\u201d and research supports that developing secure software from the outset is more cost-effective than retrofitting it. This technical training is designed to equip you with both theoretical knowledge and practical skills to combat these threats. You will learn about the characteristics of reliable software and strategies for secure development. This training is a blend of theory and hands-on practice, preparing you to develop software that stands strong in the face of cyber threats.","target_audience":"<strong>Who should attend this training?<\/strong>\n\nOur Secure Software Development training is tailor-made for those who breathe life into (web) applications, developers, designers, and anyone who plays a role in ensuring the security of these applications.\n\n<strong>Roles of participants in their organization<\/strong>\n\nThis training is meant for:\n\n<ul>\n\n<li>Developers<\/li>\n\n<li>Designers<\/li>\n\n<li>Testers<\/li>\n\n<li>Analysts<\/li>\n\n<li>Managers<\/li>\n\n<li>Auditors<\/li>\n\n<\/ul>\n\n<strong>Prior knowledge or training<\/strong>\n\nWe recommend that you come equipped with at least a basic understanding of systems development. This will help you get the most out of our training.\n\n&nbsp;","program":"<strong>Structure of this training<\/strong>\n\nThis intensive two-day training puts the spotlight on secure programming, with special focus on the most critical aspects of the application.\n\n<strong>Course outline<\/strong>\n\n<em>Introduction<\/em>\n\n<em>Security Awareness<\/em>\n\n<em>Crucial elements<\/em>\n\n<ul>\n\n<li>Authentication and session management<\/li>\n\n<li>User input<\/li>\n\n<li>Authorization<\/li>\n\n<li>Configuration management, defect handling and logging<\/li>\n\n<\/ul>\n\n<em>Secure Software Engineering<\/em>\n\n<ul>\n\n<li>Security requirements<\/li>\n\n<li>Secure coding<\/li>\n\n<li>Secure testing<\/li>\n\n<\/ul>\n\n<em>Evaluation<\/em>\n\nThis course does not aim to provide the complete theory behind Secure Programming but to cover the principles and characteristics of secure software.\n\n<strong>Possibilities in-house training<\/strong>\n\nICT Improve also provides this training in-house and tailored to your specific situation and needs upon request. For more information, please contact us at +31 (0)40 - 202 1803 or\u00a0<a href=\"mailto:opleidingen@ict-improve.nl\">training@ict-improve.nl<\/a>.","practical":"<strong>Training information:<\/strong>\n\n<ul>\n\n<li>Location and dates: check the\u00a0<a href=\"https:\/\/ict-improve.nl\/trainingen\/\">training calendar<\/a><\/li>\n\n<li>Schedule: 9:15 - 17:00 (two days)<\/li>\n\n<li>Includes coffee, tea, lunch and training material<\/li>\n\n<li>Three months free e-coaching<\/li>\n\n<\/ul>\n\nFor more information, please contact us at +31 (0)40 - 202 1803 or <a href=\"mailto:opleidingen@ict-improve.nl\">training@ict-improve.nl<\/a>\n\nICT Improve also offers bespoke in-house training tailored to your specific requirements and needs upon request.","teacher":"Your trainers are:\n\n<ul>\n\n<li>Marco de Groot<\/li>\n\n<li><a href=\"https:\/\/ict-improve.nl\/en\/trainers\/pieter-withaar\/\">Pieter Withaar<\/a><\/li>\n\n<\/ul>","session":"no","opleidingscode":"9328996c-11a8-4ead-9ad3-34ca0deb941a"},"_links":{"self":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/2005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/training"}],"about":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/types\/training"}],"version-history":[{"count":0,"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/training\/2005\/revisions"}],"wp:attachment":[{"href":"https:\/\/ict-improve.nl\/en\/wp-json\/wp\/v2\/media?parent=2005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}